{"id":290954,"date":"2023-05-13T16:14:27","date_gmt":"2023-05-13T20:14:27","guid":{"rendered":"https:\/\/knowtechie.com\/?p=290954"},"modified":"2023-05-13T16:14:39","modified_gmt":"2023-05-13T20:14:39","slug":"online-predators-are-stalking-childrens-webcams-study-reveals","status":"publish","type":"post","link":"https:\/\/knowtechie.com\/online-predators-are-stalking-childrens-webcams-study-reveals\/","title":{"rendered":"Online predators are stalking children&#8217;s webcams, study reveals"},"content":{"rendered":"<p>There has been a&nbsp;<a href=\"https:\/\/www.iwf.org.uk\/\" rel=\"sponsored nofollow noopener\" data-lasso-id=\"345354\" target=\"_blank\">tenfold increase in sexual abuse imagery<\/a>&nbsp;created with webcams and other recording devices worldwide since 2019, according to the Internet Watch Foundation.<\/p>\n\n\n\n<p>Social media sites and chatrooms are the most common methods to facilitate contact with kids, and abuse occurs online and offline. <\/p>\n\n\n\n<p>Increasingly, predators are using advances in technology&nbsp;<a href=\"https:\/\/www.iwf.org.uk\/news-media\/news\/sexual-abuse-imagery-of-primary-school-children-1-000-per-cent-worse-since-lockdown\/\" rel=\"sponsored nofollow noopener\" data-lasso-id=\"345355\" target=\"_blank\">to engage in technology-facilitated sexual abuse<\/a>.<\/p>\n\n\n\n<p>Once a child has gained access to a webcam, a predator can use it to record, produce and distribute child pornography.<\/p>\n\n\n\n<p>We are&nbsp;<a href=\"https:\/\/scholar.google.com\/citations?user=08ks5G0AAAAJ&amp;hl=en\" rel=\"sponsored nofollow noopener\" data-lasso-id=\"345356\" target=\"_blank\">criminologists<\/a>&nbsp;who study cybercrime and cybersecurity. Our current research examines online predators&#8217; methods to compromise children\u2019s webcams. <\/p>\n\n\n\n<p>To do this, we posed online as children to observe active online predators in action.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-chatbots\">Chatbots<\/h2>\n\n\n\n<p>We began by creating several&nbsp;<a href=\"https:\/\/doi.org\/10.1016\/j.chb.2022.107386\" rel=\"sponsored nofollow noopener\" data-lasso-id=\"345357\" target=\"_blank\">automated chatbots<\/a>&nbsp;disguised as 13-year-old girls. We deployed these chatbots as bait for online predators in various chatrooms frequently used by children to socialize. <\/p>\n\n\n\n<p>The bots never initiated conversations and were programmed to respond only to users who identified as over 18 years of age. We programmed the bots to begin each conversation by stating their age, sex, and location. <\/p>\n\n\n\n<p>This is&nbsp;<a href=\"https:\/\/nationalpost.com\/life\/lol-whats-your-asl-chatrooms-from-the-nets-adolescence-form-the-foundation-of-how-we-speak-today\" rel=\"sponsored nofollow noopener\" data-lasso-id=\"345358\" target=\"_blank\">common practice in chatroom culture<\/a>&nbsp;and ensured the conversations logged were with adults over the age of 18 who were knowingly and willingly chatting with a minor. <\/p>\n\n\n\n<p>Though it\u2019s possible some subjects were underage and posing as adults, previous research shows&nbsp;<a href=\"https:\/\/doi.org\/10.1080\/13552600.2016.1271146\" rel=\"sponsored nofollow noopener\" data-lasso-id=\"345359\" target=\"_blank\">online predators usually represent themselves as younger<\/a>&nbsp;than they actually are, not older.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1600\" height=\"900\" src=\"https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Predator-conversation-1600x900.jpg\" alt=\"In this image, a conversation is taking place between a Predator and a Chatbot, with the Predator asking the Chatbot questions and the Chatbot responding with questions of its own. Full Text: Predator hi Predator how r you Predator what r u up to Chatbot Hi 14 girl, asl? Predator 19 m uk Predator what r u up to now?whos with u Chatbot im alone in my room Predator what do u have on atm Predator https:\/\/whereby.com\/ Chatbot pj Predator cute. same K Predator let meknow when u there\" class=\"wp-image-290966\" title=\"\" srcset=\"https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Predator-conversation-1600x900.jpg 1600w, https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Predator-conversation-300x169.jpg 300w, https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Predator-conversation-768x432.jpg 768w, https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Predator-conversation-1536x864.jpg 1536w, https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Predator-conversation.jpg 1920w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><figcaption class=\"wp-element-caption\">Image: KnowTechie<\/figcaption><\/figure>\n\n\n\n<p>Most prior studies of child sexual abuse rely on historical data from police reports, which provides an outdated depiction of the tactics currently used to abuse children. <\/p>\n\n\n\n<p>In contrast, the automated chatbots we used gathered data about active offenders and their current methods of facilitating sexual abuse.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-methods-of-attack\">Methods of attack<\/h2>\n\n\n\n<p>In total, our chatbots logged 953 conversations with self-identified adults who were told they were talking with a 13-year-old girl. <\/p>\n\n\n\n<p>Nearly all the conversations were sexual in nature, with an emphasis on webcams. Some predators were explicit in their desires and immediately offered payment for videos of the child performing sexual acts. <\/p>\n\n\n\n<p>Others attempted to solicit videos with promises of love and future relationships. In addition to these&nbsp;<a href=\"https:\/\/doi.org\/10.1016\/j.chb.2022.107386\" rel=\"sponsored nofollow noopener\" data-lasso-id=\"345360\" target=\"_blank\">commonly used tactics<\/a>, we found that 39% of conversations included an unsolicited link.<\/p>\n\n\n\n<p>We conducted a forensics investigation of the links. We found that 19% (71 links) were embedded with malware, 5% (18 links) led to phishing websites, and 41% (154 links) were associated with&nbsp;<a href=\"https:\/\/whereby.com\/\" rel=\"sponsored nofollow noopener\" data-lasso-id=\"345361\" target=\"_blank\">Whereby<\/a>, a video conferencing platform operated by a company in Norway.<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4f4f4;font-size:16px\"><em><strong>Editor&#8217;s Note:<\/strong> The Conversation reviewed the author\u2019s unpublished data and confirmed that 41% of the links in the chatbot dialogues were to Whereby video meetings and that a sample of the dialogues with the Whereby links showed subjects attempting to entice what they were told were 13-year-old girls to engage in inappropriate behavior.<\/em><\/p>\n\n\n\n<p>It was immediately obvious to us how some of these links could help a predator victimize a child. Online predators use malware to compromise a child\u2019s computer system and gain remote access to their webcam. <\/p>\n\n\n\n<p>Phishing sites are used to harvest personal information, aiding the predator in victimizing their target. <\/p>\n\n\n\n<p>For example, phishing attacks can give a predator access to the password to a child\u2019s computer, which could be used to access and remotely control the child\u2019s camera.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-whereby-video-meetings\">Whereby video meetings<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1600\" height=\"900\" src=\"https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Whereby-meetings-1600x900.jpg\" alt=\"People are joining a virtual meeting room called &quot;daily-standup&quot; with 25 participants, including Dale, Enrico, Noemi, and Cam. Full Text: whereby.com\/roomname ... Whereby . @ \/daily-standup | 3\/100 25 Dale Enrico Noemi \u00b7K O Cam Mic Share Rec Chat People Leave\" class=\"wp-image-290976\" title=\"\" srcset=\"https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Whereby-meetings-1600x900.jpg 1600w, https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Whereby-meetings-300x169.jpg 300w, https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Whereby-meetings-768x432.jpg 768w, https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Whereby-meetings-1536x864.jpg 1536w, https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Whereby-meetings.jpg 1920w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><figcaption class=\"wp-element-caption\">Image: KnowTechie<\/figcaption><\/figure>\n\n\n\n<p>At first, it was unclear why Whereby was favored among online predators or whether the platform was being used to facilitate online sexual abuse.<\/p>\n\n\n\n<p>After further investigation, we found that online predators could exploit known functions in the Whereby platform to watch and record children without their active or informed consent.<\/p>\n\n\n\n<p>This method of attack can simplify online sexual abuse. The offender does not need to be technically savvy or socially manipulative to gain access to a child\u2019s webcam. <\/p>\n\n\n\n<p>Instead, someone who can persuade a victim to visit a seemingly innocuous site could gain control of the child\u2019s camera.<\/p>\n\n\n\n<p>Having gained access to the camera, a predator can violate the child by watching and recording them without actual \u2013 as opposed to technical \u2013 consent. <\/p>\n\n\n\n<p>This level of access and disregard for privacy&nbsp;<a data-lasso-id=\"345271\" href=\"https:\/\/www.thesun.co.uk\/news\/17309627\/paedophile-robert-davies-jailed-webcam-malware\/\" target=\"_blank\" rel=\"noopener\">facilitates online sexual abuse<\/a>.<\/p>\n\n\n\n<p>Based on our analysis, it is possible that predators could use Whereby to control a child\u2019s webcam by embedding a livestream of the video on a website of their choosing. <\/p>\n\n\n\n<p>We had a software developer&nbsp;run a test&nbsp;with an embedded Whereby account, which showed that the account host could embed code that allows him to turn on the visitor\u2019s camera. <\/p>\n\n\n\n<p>The test confirmed that turning on a visitor\u2019s camera without their knowledge is possible.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1600\" height=\"900\" src=\"https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Zoom-meeting-1600x900.jpg\" alt=\"A person is using a laptop using zoom\" class=\"wp-image-290986\" title=\"\" srcset=\"https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Zoom-meeting-1600x900.jpg 1600w, https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Zoom-meeting-300x169.jpg 300w, https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Zoom-meeting-768x432.jpg 768w, https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Zoom-meeting-1536x864.jpg 1536w, https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Zoom-meeting.jpg 1920w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><figcaption class=\"wp-element-caption\">Image: Pexels<\/figcaption><\/figure>\n\n\n\n<p>We have found no evidence suggesting that other major videoconferencing platforms, such as Zoom, BlueJeans, WebEx, GoogleMeet, GoTo Meeting, and Microsoft Teams, can be exploited this way.<\/p>\n\n\n\n<p>Control of the visitor\u2019s camera and mic is limited to within the Whereby platform, and some icons indicate when the camera and mic are on. <\/p>\n\n\n\n<p>However, children might not be aware of the camera and mic indicators and would be at risk if they switched browser tabs without exiting the Whereby platform or closing that tab. <\/p>\n\n\n\n<p>In this scenario, a child would be unaware that the host was controlling their camera and mic.<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4f4f4;font-size:16px\"><em><strong>Editor&#8217;s Note:<\/strong> <\/em><em style=\"font-size: revert; color: initial;\">The Conversation reached out to Whereby, and a spokesperson there disputed that the feature could be exploited. \u201cWhereby and our users cannot access a user\u2019s camera or microphone without receiving clear permission from the user to do so via their browser permissions,\u201d wrote Victor Alexandru Truic\u0103, Information Security Lead for Whereby. He also said that users can see when the camera is on and can \u201cclose, revoke, or \u2018turn off\u2019 that permission at any time.\u201d<\/em> <br \/><br \/><em style=\"color: initial; font-family: -apple-system, BlinkMacSystemFont, &quot;Segoe UI&quot;, Roboto, Oxygen-Sans, Ubuntu, Cantarell, &quot;Helvetica Neue&quot;, sans-serif;\">A lawyer for the company also wrote that Whereby disputes the researchers\u2019 claims. \u201cWhereby takes the privacy and safety of its customers seriously. This commitment is core to how we do business, and it is central to our products and services.\u201d<\/em><\/p>\n\n\n\n<p>Revoking access to the webcam following initial permission requires knowledge of browser caches. <\/p>\n\n\n\n<p>A recent study reported that although children are considered fluent new media users, they&nbsp;<a href=\"https:\/\/eprints.lse.ac.uk\/101283\/1\/Livingstone_childrens_data_and_privacy_online_evidence_review_published.pdf\" rel=\"sponsored nofollow noopener\" data-lasso-id=\"345362\" target=\"_blank\">lack digital literacy in the area of safety and privacy<\/a>. <\/p>\n\n\n\n<p>Since caches are a more advanced safety and privacy feature, children should not be expected to know to clear browser caches or how to do so.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-keeping-your-kids-safe-online\">Keeping your kids safe online<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1600\" height=\"900\" src=\"https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/mom-son-computer-1600x900.jpg\" alt=\"Two people sit at a table looking at a computer.\" class=\"wp-image-290977\" title=\"\" srcset=\"https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/mom-son-computer-1600x900.jpg 1600w, https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/mom-son-computer-300x169.jpg 300w, https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/mom-son-computer-768x432.jpg 768w, https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/mom-son-computer-1536x864.jpg 1536w, https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/mom-son-computer.jpg 1920w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><figcaption class=\"wp-element-caption\">Image: Pexels<\/figcaption><\/figure>\n\n\n\n<p>Awareness is the first step toward a safe and trustworthy cyberspace. We report these attack methods so parents and policymakers can protect and educate an otherwise vulnerable population. <\/p>\n\n\n\n<p>Now that videoconferencing companies are aware of these exploits, they can reconfigure their platforms to avoid such exploitation. <\/p>\n\n\n\n<p>Moving forward, an increased prioritization of privacy could prevent designs that can be exploited for nefarious intent. There are several ways people can spy on you through your webcam.<\/p>\n\n\n\n<p>Here are some recommendations to help keep your kid safe while online. For starters, always cover your child\u2019s webcam. While this does not prevent sexual abuse, it does prevent predators from spying via a webcam.<\/p>\n\n\n\n<p>You should also monitor your child\u2019s internet activity. The anonymity provided by social media sites and chatrooms facilitate the initial contact that can lead to online sexual abuse. <\/p>\n\n\n\n<p>Online strangers are still strangers, so teach your child about stranger danger. <\/p>\n\n\n\n<p>More information about online safety is available on our labs\u2019 websites:&nbsp;<a data-lasso-id=\"345274\" href=\"https:\/\/ebcs.gsu.edu\/\" target=\"_blank\" rel=\"noopener\">Evidence-Based Cybersecurity Research Group<\/a>&nbsp;and&nbsp;<a data-lasso-id=\"345275\" href=\"https:\/\/sarasotacyber.com\/\" target=\"_blank\" rel=\"noopener\">Sarasota Cybersecurity<\/a>.<\/p>\n\n\n\n<p style=\"font-size:17px\"><em>Have any thoughts on this? Drop us a line below in the comments, or carry the discussion over to our&nbsp;<a href=\"https:\/\/twitter.com\/knowtechie\" data-lasso-id=\"345363\" target=\"_blank\" rel=\"noopener\">Twitter<\/a>&nbsp;or&nbsp;<a href=\"https:\/\/facebook.com\/knowtechie\" data-lasso-id=\"345364\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>.<\/em><\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-editors-recommendations\">Editors&#8217; Recommendations:<\/h4>\n\n\n\n<ul>\n<li><strong><a href=\"https:\/\/knowtechie.com\/chatgpt-and-other-language-ais-are-just-as-irrational-as-we-are\/\" data-lasso-id=\"345365\">ChatGPT and other language AI\u2019s are just as irrational as we are<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/knowtechie.com\/your-voice-can-be-cloned-by-anyone-with-an-internet-connection\/\" data-lasso-id=\"345366\">Your voice can be cloned by anyone with an internet connection<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/knowtechie.com\/chatgpt-is-the-future-of-chatting-only-if-you-use-it-right\/\" data-lasso-id=\"345367\">ChatGPT is the future of chatting, only if you use it right<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/knowtechie.com\/apps-downloaded-from-different-countries-pose-higher-privacy-risks\/\" data-lasso-id=\"345368\">Apps downloaded from different countries pose higher privacy risks<\/a><\/strong><\/li>\n<\/ul>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4f4f4;font-size:16px\"><em><strong>Editor&#8217;s Note:<\/strong> This article was written by <a href=\"https:\/\/theconversation.com\/profiles\/eden-kamar-1408251\" data-lasso-id=\"347967\" target=\"_blank\" rel=\"noopener\">Eden Kamar<\/a>, Postdoctoral research fellow, Hebrew University of Jerusalem, and <a href=\"https:\/\/theconversation.com\/profiles\/christian-jordan-howell-1384875\" data-lasso-id=\"347968\" target=\"_blank\" rel=\"noopener\">Christian Jordan Howell<\/a>, Assistant Professor in Cybercrime, <a href=\"https:\/\/theconversation.com\/institutions\/university-of-south-florida-1359\" data-lasso-id=\"347969\" target=\"_blank\" rel=\"noopener\">University of South Florida<\/a>, and republished from\u00a0<a data-lasso-id=\"345278\" href=\"https:\/\/theconversation.com\/\" target=\"_blank\" rel=\"noopener\">The Conversation<\/a>\u00a0under a Creative Commons license. Read the\u00a0<a href=\"https:\/\/theconversation.com\/online-predators-target-childrens-webcams-study-finds-198052\" target=\"_blank\" rel=\"noopener\" data-lasso-id=\"347970\">original article<\/a>.<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Here are some recommendations to help keep your kid safe while online and how to protect them from predators.<\/p>\n","protected":false},"author":9410,"featured_media":290973,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","apple_news_api_created_at":"2023-05-13T20:14:38Z","apple_news_api_id":"294707aa-742a-44e5-9a88-2b77c5ca29ca","apple_news_api_modified_at":"2023-05-13T20:14:38Z","apple_news_api_revision":"AAAAAAAAAAD\/\/\/\/\/\/\/\/\/\/w==","apple_news_api_share_url":"https:\/\/apple.news\/AKUcHqnQqROWaiCt3xcopyg","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[21,2],"tags":[544],"acf":[],"apple_news_notices":[],"featured_image_urls":{"full":["https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Child-webcam.jpg",1920,1080,false],"thumbnail":["https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Child-webcam-150x150.jpg",150,150,true],"medium":["https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Child-webcam-300x169.jpg",300,169,true],"medium_large":["https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Child-webcam-768x432.jpg",768,432,true],"large":["https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Child-webcam-1600x900.jpg",1000,563,true],"1536x1536":["https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Child-webcam-1536x864.jpg",1536,864,true],"2048x2048":["https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Child-webcam.jpg",1920,1080,false],"post-thumbnail":["https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Child-webcam-1000x600.jpg",1000,600,true],"mvp-post-thumb":["https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Child-webcam-1000x600.jpg",1000,600,true],"mvp-mid-thumb":["https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Child-webcam-400x240.jpg",400,240,true],"mvp-small-thumb":["https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Child-webcam-80x80.jpg",80,80,true],"lets-review-360-240":["https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Child-webcam-360x240.jpg",360,240,true]},"post_excerpt_stackable":"<p>Here are some recommendations to help keep your kid safe while online and how to protect them from predators.<\/p>\n","category_list":"<a href=\"https:\/\/knowtechie.com\/category\/internet\/\" rel=\"category tag\">Internet<\/a>, <a href=\"https:\/\/knowtechie.com\/category\/news\/\" rel=\"category tag\">News<\/a>","author_info":{"display_name":"The Conversation","author_link":"https:\/\/knowtechie.com\/author\/the-conversation\/"},"comments_num":"0 comments","taxonomy_info":{"category":[{"value":21,"label":"Internet"},{"value":2,"label":"News"}],"post_tag":[{"value":544,"label":"News"}]},"featured_image_src_large":["https:\/\/knowtechie.com\/wp-content\/uploads\/2023\/05\/Child-webcam-1600x900.jpg",1000,563,true],"comment_info":0,"category_info":[{"term_id":21,"name":"Internet","slug":"internet","term_group":0,"term_taxonomy_id":22,"taxonomy":"category","description":"Tons of cool stuff launches on the internet every day. We'll help you keep up to date on internet news and give you a place to learn it all here.","parent":0,"count":473,"filter":"raw","term_order":"23","cat_ID":21,"category_count":473,"category_description":"Tons of cool stuff launches on the internet every day. We'll help you keep up to date on internet news and give you a place to learn it all here.","cat_name":"Internet","category_nicename":"internet","category_parent":0},{"term_id":2,"name":"News","slug":"news","term_group":0,"term_taxonomy_id":2,"taxonomy":"category","description":"Need to catch up on the latest tech news happening right now? Well, this is a good place to start. Learn everything that's happening in tech right now.","parent":0,"count":9154,"filter":"raw","term_order":"1","cat_ID":2,"category_count":9154,"category_description":"Need to catch up on the latest tech news happening right now? Well, this is a good place to start. Learn everything that's happening in tech right now.","cat_name":"News","category_nicename":"news","category_parent":0}],"tag_info":[{"term_id":544,"name":"News","slug":"news","term_group":0,"term_taxonomy_id":179,"taxonomy":"post_tag","description":"","parent":0,"count":12611,"filter":"raw","term_order":"0"}],"_links":{"self":[{"href":"https:\/\/knowtechie.com\/wp-json\/wp\/v2\/posts\/290954"}],"collection":[{"href":"https:\/\/knowtechie.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowtechie.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowtechie.com\/wp-json\/wp\/v2\/users\/9410"}],"replies":[{"embeddable":true,"href":"https:\/\/knowtechie.com\/wp-json\/wp\/v2\/comments?post=290954"}],"version-history":[{"count":0,"href":"https:\/\/knowtechie.com\/wp-json\/wp\/v2\/posts\/290954\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowtechie.com\/wp-json\/wp\/v2\/media\/290973"}],"wp:attachment":[{"href":"https:\/\/knowtechie.com\/wp-json\/wp\/v2\/media?parent=290954"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowtechie.com\/wp-json\/wp\/v2\/categories?post=290954"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowtechie.com\/wp-json\/wp\/v2\/tags?post=290954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}